Date: | Tue, 09 Aug 2005 16:23:20 -0600 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #246 |
SecurityFocus Linux Newsletter #246
----------------------------------------
This Issue is Sponsored By: AirDefense
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You
Don't
Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:
http://www.securityfocus.com/sponsor/AirDefense_linux-secnews_050726
------------------------------------------------------------------
I. FRONT AND CENTER
1. Greasing the wheel with Greasemonkey
2. Security still underfunded
II. LINUX VULNERABILITY SUMMARY
1. No-Brainer SMTP Client Log_Msg() Remote Format String
Vulnerability
2. Computer Associates BrightStor ARCserve Backup Remote Buffer
Overflow Vulnerability
3. Metasploit Framework MSFWeb Defanged Mode Restriction Bypass
Vulnerability
4. Linux Kernel Stack Fault Exceptions Unspecified Local Denial
of Service Vulnerability
5. Linux Kernel NFSACL Protocol XDR Data Remote Denial of
Service Vulnerability
6. Linux Kernel XFRM Array Index Buffer Overflow Vulnerability
7. Lantronix Secure Console Server SCS820/SCS1620 Multiple Local
Vulnerabilities
III. LINUX FOCUS LIST SUMMARY
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Greasing the wheel with Greasemonkey
By Scott Granneman
If blogging is enjoyable because it allows us to watch an interesting
mind at work, then Jon Udell's blog is definitely among the most
enjoyable.
http://www.securityfocus.com/columnists/346
2. Security still underfunded
By Kelly Martin
Blackhat is one of my favorite places to do some casual online banking
over an insecure WiFi connection. Where's the risk, right?
http://www.securityfocus.com/columnists/345
II. LINUX VULNERABILITY SUMMARY
------------------------------------
1. No-Brainer SMTP Client Log_Msg() Remote Format String Vulnerability
BugTraq ID: 14441
Remote: Yes
Date Published: 2005-08-01
Relevant URL: http://www.securityfocus.com/bid/14441
Summary:
A remote format string vulnerability affects the message logging
functionality of nbSMTP. This issue is due to a failure of the application to
properly sanitize user-supplied input prior to passing it as the format
specifier to a formatted printing function.
A remote attacker may leverage this issue to write to arbitrary process
memory, facilitating code execution.
2. Computer Associates BrightStor ARCserve Backup Remote Buffer
Overflow Vulnerability
BugTraq ID: 14453
Remote: Yes
Date Published: 2005-08-02
Relevant URL: http://www.securityfocus.com/bid/14453
Summary:
Computer Associates BrightStor ARCserve Backup and BrightStor
Enterprise Backup Agents for Windows are affected by a remote stack-based buffer
overflow vulnerability. This issue is due to a failure of the
application to perform proper bounds checking on data supplied to the
application.
A remote attacker may exploit this issue to execute arbitrary code on a
vulnerable computer with SYSTEM privileges. A denial of service
condition may arise as well.
3. Metasploit Framework MSFWeb Defanged Mode Restriction Bypass
Vulnerability
BugTraq ID: 14455
Remote: Yes
Date Published: 2005-08-02
Relevant URL: http://www.securityfocus.com/bid/14455
Summary:
Metasploit Framework is susceptible to a restriction bypass
vulnerability in msfweb. This issue is due to a failure of the application to
properly implement access control restrictions.
This issue allows remote attackers to bypass security restrictions in
the affected Web server. Attackers may exploit this issue to attack
arbitrary computers using the Metasploit Framework, while originating the
attacks from the computer hosting the vulnerable msfweb process.
Attackers may also interact with the payload features in the Metasploit
Framework to manipulate files on the hosting computer, likely leading
to executing arbitrary commands and then complete system compromise.
It should be noted that the Metasploit Framework documentation
specifies that msfweb should not be globally accessible, due to potential
security problems.
4. Linux Kernel Stack Fault Exceptions Unspecified Local Denial of
Service Vulnerability
BugTraq ID: 14467
Remote: No
Date Published: 2005-08-03
Relevant URL: http://www.securityfocus.com/bid/14467
Summary:
Linux kernel is reported prone to an unspecified local denial of
service vulnerability.
It was reported that this issue arises when a local user triggers stack
fault exceptions. A local attacker may exploit this issue to carry out
a denial of service attack against a vulnerable computer by crashing
the kernel.
5. Linux Kernel NFSACL Protocol XDR Data Remote Denial of Service
Vulnerability
BugTraq ID: 14470
Remote: Yes
Date Published: 2005-08-04
Relevant URL: http://www.securityfocus.com/bid/14470
Summary:
Linux Kernel is affected by a remote denial of service vulnerability
when handling XDR data for the nfsacl protocol.
Specific details about this issue were not disclosed. It is
conjectured that an attacker crafts malformed XDR data that contains large string
values to corrupt kernel memory.
This may result in a denial of service condition.
6. Linux Kernel XFRM Array Index Buffer Overflow Vulnerability
BugTraq ID: 14477
Remote: No
Date Published: 2005-08-05
Relevant URL: http://www.securityfocus.com/bid/14477
Summary:
Linux kernel is prone to an array index buffer overflow vulnerability.
This issue exists due to insufficient validation of user-supplied data.
The vulnerability exists in the XFRM network architecture code.
A successful attack can allow a local attacker to trigger an overflow,
which may lead to a denial of service condition due to memory
corruption. Arbitrary code execution may be possible, however, this has not
been confirmed.
This issue affects Linux Kernel versions 2.6.x.
7. Lantronix Secure Console Server SCS820/SCS1620 Multiple Local
Vulnerabilities
BugTraq ID: 14486
Remote: No
Date Published: 2005-08-05
Relevant URL: http://www.securityfocus.com/bid/14486
Summary:
Lantronix Secure Console Server SCS820/SCS1620 devices are susceptible
to multiple local vulnerabilities.
The first issue is an insecure default permission vulnerability.
Attackers may exploit this vulnerability to write data to arbitrary files
with superuser privileges. Other attacks are also possible.
The second issue is a directory traversal vulnerability in the
command-line interface. Attackers may exploit this vulnerability to gain
inappropriate access to the underlying operating system.
The third issue is a privilege escalation vulnerability in the
command-line interface. Local users with 'sysadmin' access to the device can
escape the command-line interface to gain superuser privileges in the
underlying operating system.
The last issue is a buffer overflow vulnerability in the 'edituser'
binary. Attackers may exploit this vulnerability to execute arbitrary
machine code with superuser privileges.
The reporter of these issues states that firmware versions prior to 4.4
are vulnerable.
III. LINUX FOCUS LIST SUMMARY
---------------------------------
If your email address has changed email listadmin@securityfocus.com and
ask to be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: AirDefense
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You
Don't
Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:
http://www.securityfocus.com/sponsor/AirDefense_linux-secnews_050726